Description
dizqueTV 1.5.3 contains a remote code execution vulnerability that allows attackers to inject arbitrary commands through the FFMPEG Executable Path settings. Attackers can modify the executable path with shell commands to read system files like /etc/passwd by exploiting improper input validation.
Problem types
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Product status
1.5.3
Credits
Ahmed Said Saud Al-Busaidi
References
www.exploit-db.com/exploits/52079 (ExploitDB-52079)
github.com/vexorian/dizquetv (DizqueTV GitHub Repository)
www.vulncheck.com/...de-execution-via-ffmpeg-executable-path (VulnCheck Advisory: dizqueTV 1.5.3 Remote Code Execution via FFMPEG Executable Path)
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.